CVE-2024-22279

Improper handling of requests in Routing Release > v0.273.0 and <= v0.297.0 allows an unauthenticated attacker to degrade the service availability of the Cloud Foundry deployment if performed at scale.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*
cpe:2.3:a:cloudfoundry:routing_release:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:55

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 5.9
References () https://www.cloudfoundry.org/blog/cve-2024-22279-gorouter-denial-of-service-attack/ - Vendor Advisory () https://www.cloudfoundry.org/blog/cve-2024-22279-gorouter-denial-of-service-attack/ - Vendor Advisory

12 Jun 2024, 18:04

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.9
v2 : unknown
v3 : 7.5
First Time Cloudfoundry
Cloudfoundry routing Release
Cloudfoundry cf-deployment
References () https://www.cloudfoundry.org/blog/cve-2024-22279-gorouter-denial-of-service-attack/ - () https://www.cloudfoundry.org/blog/cve-2024-22279-gorouter-denial-of-service-attack/ - Vendor Advisory
CPE cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*
cpe:2.3:a:cloudfoundry:routing_release:*:*:*:*:*:*:*:*
Summary
  • (es) El manejo inadecuado de las solicitudes en Routing Release &gt; v0.273.0 y &lt;= v0.297.0 permite que un atacante no autenticado degrade la disponibilidad del servicio de la implementación de Cloud Foundry si se realiza a escala.

10 Jun 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-10 20:15

Updated : 2024-11-21 08:55


NVD link : CVE-2024-22279

Mitre link : CVE-2024-22279

CVE.ORG link : CVE-2024-22279


JSON object : View

Products Affected

cloudfoundry

  • routing_release
  • cf-deployment
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')